Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:36
Behavioral task
behavioral1
Sample
05cc7ff1758cdedd65218e6028b4df29.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05cc7ff1758cdedd65218e6028b4df29.exe
Resource
win10v2004-20231215-en
General
-
Target
05cc7ff1758cdedd65218e6028b4df29.exe
-
Size
507KB
-
MD5
05cc7ff1758cdedd65218e6028b4df29
-
SHA1
60e6c29abbb08ef9ebea59a8cc6e73309b81fa0b
-
SHA256
73f11d77d09efafc9a90c885b837ed6b581e71a1b39e7fefdedcbbf58997faa4
-
SHA512
3ddec343c13c259b595d638c0e496feaeca7d3e013953d085518e6cae9baec7e9ca4f2390fa9f15559b71bf2fa2076dafcaffbab7010e8823fef0a8dc41e5400
-
SSDEEP
12288:g08PKZVQQxfnr+TK7r79/J0NWNf37JcAayM5ahHj2:b8AVQQxfnr+TK7r79/J0ofrJEyM5ahD2
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000d00000001473e-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1980 (null)0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\05cc7ff1758cdedd65218e6028b4df29.exe" 05cc7ff1758cdedd65218e6028b4df29.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 05cc7ff1758cdedd65218e6028b4df29.exe File opened for modification \??\c:\Windows\BJ.exe 05cc7ff1758cdedd65218e6028b4df29.exe File created \??\c:\Windows\(null)0.exe 05cc7ff1758cdedd65218e6028b4df29.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1980 2756 05cc7ff1758cdedd65218e6028b4df29.exe 28 PID 2756 wrote to memory of 1980 2756 05cc7ff1758cdedd65218e6028b4df29.exe 28 PID 2756 wrote to memory of 1980 2756 05cc7ff1758cdedd65218e6028b4df29.exe 28 PID 2756 wrote to memory of 1980 2756 05cc7ff1758cdedd65218e6028b4df29.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\05cc7ff1758cdedd65218e6028b4df29.exe"C:\Users\Admin\AppData\Local\Temp\05cc7ff1758cdedd65218e6028b4df29.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\Windows\(null)0.exec:\Windows\(null)0.exe2⤵
- Executes dropped EXE
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507KB
MD505cc7ff1758cdedd65218e6028b4df29
SHA160e6c29abbb08ef9ebea59a8cc6e73309b81fa0b
SHA25673f11d77d09efafc9a90c885b837ed6b581e71a1b39e7fefdedcbbf58997faa4
SHA5123ddec343c13c259b595d638c0e496feaeca7d3e013953d085518e6cae9baec7e9ca4f2390fa9f15559b71bf2fa2076dafcaffbab7010e8823fef0a8dc41e5400